An efficient network anomaly detection scheme based on TCM-KNN algorithm and data reduction mechanism

被引:5
作者
Li, Yang [1 ]
Guo, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100080, Peoples R China
来源
2007 IEEE INFORMATION ASSURANCE WORKSHOP | 2007年
基金
中国国家自然科学基金;
关键词
network security; anomaly detection; TCM-KNN; algorithm; data reduction;
D O I
10.1109/IAW.2007.381936
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network anomaly detection plays a vita role in securing network security and infrastructures. Current research focuses concentrate on how to effective reduce high false alarm rate and usually ignore the fact that the poor quality data for the modeling of normal patterns as well as the high computational cost make the current anomaly detection methods not act as well as we expect. Based on these, we first propose a novel data mining scheme for network anomaly detection in this paper. Moreover, we adopt data reduction mechanisms (including genetic algorithm (GA) based instance selection and filter based feature selection methods) to boost the detection performance, meanwhile reduce the computational cost of TCM-KNN. Experimental results on the well-known KDD Cup 1999 dataset demonstrate the proposed method can effectively detect anomalies with high detection rates, low false positives as well as with high confidence than the state-of-the-art anomaly detection methods. Furthermore, the data reduction mechanisms would greatly improve the performance of TCM-KNN and make it be a good candidate for anomaly detection in practice.
引用
收藏
页码:221 / +
页数:3
相关论文
共 15 条
[1]  
Barbara D., 2001, P 1 SIAM C DAT MIN C
[2]   Detecting network intrusions via a statistical analysis of network packet characteristics [J].
Bykova, M ;
Ostermann, S ;
Tjaden, B .
PROCEEDINGS OF THE 33RD SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2001, :309-314
[3]  
DANIEL B, 2006, P 12 ACM SIGKDD INT, P55
[4]  
Eskin E., 2002, Applications of Data Mining in Computer Security, P77, DOI [10.1007/978-1-4615-0953-04, DOI 10.1007/978-1-4615-0953-04]
[5]   Prediction algorithms and confidence measures based on algorithmic randomness theory [J].
Gammerman, A ;
Vovk, V .
THEORETICAL COMPUTER SCIENCE, 2002, 287 (01) :209-217
[6]  
GHOSH AK, 1999, P 8 USENIX SEC S
[7]  
Jose R., 2006, IEEE T EVOLUTIONARY, P561
[8]  
Laetitia J., 2001, P 4 MET INT C, P29
[9]  
Lee W., 1998, P 1998 USENIX SEC S
[10]  
Li Y, 2007, 2007 International Symposium on Computer Science & Technology, Proceedings, P133